Data Analytics in Information Security: Enabling Intelligent Cyber Defense

Authors

  • Mani Sai Kamal Darla Walmart, USA

DOI:

https://doi.org/10.47941/ijce.2994

Keywords:

Data Analytics, Cybersecurity, Extended Detection Response, Machine Learning, Zero Trust Architecture

Abstract

The digital metamorphosis period has unnaturally altered cybersecurity paradigms, challenging a shift from reactive defense mechanisms to visionary, intelligence-driven security fabrics. Contemporary trouble geographies encompass expanded attack shells through Internet of effects proliferation, pall relinquishment, and distributed pool models that challenge traditional border-grounded security infrastructures. Data analytics technologies, including Extended Discovery and Response systems, machine learning algorithms, Edge artificial intelligence, and Zero Trust Architecture executions, demonstrate substantial functional effectiveness in trouble discovery, response time reduction, and scalability across distributed computing environments. Healthcare and fiscal sectors show transformative advancements through behavioral analytics and anomaly discovery systems, while cost-benefit evaluations reveal compelling, profitable advantages for visionary security investments over reactive incident response models. Still, advanced cybersecurity executions raise significant ethical concerns regarding surveillance overreach, algorithmic bias in automated decision-making systems, and nonsupervisory compliance challenges across multiple authorities. Balancing security effectiveness with sequestration preservation requires sophisticated, specialized results incorporating sequestration-enhancing technologies while maintaining acceptable trouble discovery capabilities. The elaboration toward intelligent cyber defense systems represents an abecedarian metamorphosis in organizational security postures, demanding careful consideration of technological capabilities, functional conditions, and ethical scores in increasingly connected digital surroundings.

Downloads

Download data is not yet available.

References

Cisco Systems, "Cisco Annual Internet Report (2018–2023) White Paper," Cisco, 2020. [Online]. Available: https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.html

IBM Security, "Cost of a Data Breach Report 2024," 2024. [Online]. Available: https://wp.table.media/wp-content/uploads/2024/07/30132828/Cost-of-a-Data-Breach-Report-2024.pdf

Verizon Business, "2024 Data Breach Investigations Report," 2024. [Online]. Available: https://www.verizon.com/business/resources/reports/2024-dbir-data-breach-investigations-report.pdf

Aleksandra Kuzior et al., "Cybersecurity and cybercrime: Current trends and threats," Journal of International Studies, 2024. [Online]. Available: https://www.jois.eu/files/12_1441_JIS_Tiutiunyk%20et%20al.pdf

Gartner, "MarketGuide for Managed Detection and Response Services," 2020. [Online]. Available: https://evessio.s3.amazonaws.com/customer/8c4659ee-526a-4e9c-89dc-f6f4c3c1a789/event/534fc922-9dda-4ab8-96a9-85e8ad2921bb/responses/10fe8a5c-0671-4e4b-ae8d-97019eaf0870/5c5c900b-profile_Gartner_Market_Guide_for_MDR_August_2020.pdf

NIST, "Artificial Intelligence Risk Management Framework (AI RMF 1.0)," 2023. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/ai/nist.ai.100-1.pdf

Scarlet Rosalie Biedron, "Cybercrime in the Digital Age: How Big Data, Cryptocurrency, and Communication Networks Shape Cyber Offending, Cyber Security, and Law Enforcement," Centre for Criminology, Faculty of Law. [Online]. Available: https://ora.ox.ac.uk/objects/uuid:5fe21811-9bf6-4489-b91d-a195366122e3/files/db5644s52h

Estefania Vergara Cobos and Selcen Cakir, "A Review of the Economic Costs of Cyber Incidents". [Online]. Available: https://documents1.worldbank.org/curated/en/099092324164536687/pdf/p17876919ffee4079180e81701969ad0a18.pdf

Reeshad S. Dalal et al., "Security, Privacy, and Surveillance in Cyberspace: Organizational Science Concerns and Contributions," Journal of Business and Psychology, 2024. [Online]. Available: https://link.springer.com/content/pdf/10.1007/s10869-024-09968-1.pdf

Kevin Macnish and Jeroen van der Ham, "Ethics in cybersecurity research and practice," ScienceDirect, 2020. [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0160791X19306840

Downloads

Published

2025-07-23

How to Cite

Darla, M. S. K. (2025). Data Analytics in Information Security: Enabling Intelligent Cyber Defense. International Journal of Computing and Engineering, 7(13), 11–22. https://doi.org/10.47941/ijce.2994

Issue

Section

Articles